7 Executive SUmmary There have been numerous transformations in the interrelated realms of software development (SD) and IT security. To form a clear picture of the SD trends and account for their implications, we conducted an explorative study comprising 23 interviews with SD and IT security experts from industry, academia and regulating institutions. The analysis reveals six major trends: 1. SD s Working Environment: Dynamic, Flexible, Distributed The acceleration, fluctuation of cooperating partners, distribution of production sites and complexity of supply chains call for finding ways to build continuity into SD processes. To guarantee developers have a shared vision, companies must invest significantly in proper communication and enable team members to build strong relationships so as to be clear about product security relevant requirements. Companies are well advised to establish long-term and trustable relationships with outsourcing partners and to abstain from outsourcing critical components. Harmonizing tools, frameworks and Integrated Development Environment (IDE) with the outsourcing partner may reduce compatibility issues. In general, the complexity of supply chains calls for improved techniques to measure and certify components. 2. Widespread Adoption of Agile Software Development Agile SD is oftentimes portrayed as a way to adapt to a rapidly changing environment. As teams and team roles become flexible, agile SD raises the level of IT security expertise any individual developer needs to have. The latter must not be overburdened with security considerations, though. Therefore, agile SD makes it even more important to integrate security processes systematically and make security expertise scalable. While agile SD is about adapting to rapidly changing circumstances forced by market pressure, software systems tend to run for quite a while. This makes it mandatory to preserve expertise and knowledge and to trace decisions that went into system construction. Last but not least, usability should be taken seriously as a security factor. Agile SD allows the integration of»laymen expertise«right from the beginning by involving customers/end users. 3. Code Generation and Assembly of (Prefabricated) Code There is a certain»democratization«of SD allowing developers without formal engineering education to create code. To make sure secure code is being generated by laymen, security must be factored into self-learning platforms and code generators. In industrial SD, security should be automated by integrating security features into Integrated Development Environments, frameworks and libraries. The latter devices must be equipped with tools that allow for testing and generating secure building blocks. Developers must be able to keep a consistent relation between modeling and source code level (round-trip engineering) and to make informed decisions when selecting a framework. This presupposes framework security certification. As there is more sharing of code (on the web, etc.), developers should have acquired the skills to check such code for security, whereas companies may consider formulating sharing policies. As the phenomenon of crowdsourcing software development gains a foothold, research is called upon to investigate security implications. 5

8 4. Compositional Systems and Modularization Compositionality and modularization entails a profound paradigm change as regards security. Study participants mentioned a range of measures that companies may take to increase the probability of producing secure compositional systems, such as no integration of external components as a black box; rigorous testing of security relevant components and raising security relevant parameters; continuous integration of new features or code portions; a clear understanding of the integrated component s code; checking and safeguarding the compatibility of the in-house code base with external code; reducing the attack surface by deactivating the external component s functionalities that are not in use; etc. In the future it will be desirable to dispose of the formal specifications of the components characteristics and automatable testing procedures and specifications of valid indicators concerning the static and dynamic quality and security attributes of compositional systems. This should be done in order to enable certification and legal guarantees of a component s security. Preferably, R&D manages to produce intrinsically secure building blocks/ components guaranteeing secure compositional systems. 5. Distributed Systems and Intensified (Cross Domain) Networking There are similar issues if it comes to distributed systems: there is a demand to develop techniques allowing one to determine the security level of distributed systems at runtime and to make a distributed system s components intrinsically secure. In matters of Cloud Computing one specific form of distributed systems techniques to separate sensitive from non-sensitive data as well as solving legal and liability issues are required. Furthermore, as distributed systems may network sub-systems from different domains, an amalgamation of perspectives and techniques from different domains is necessary. The aforementioned domains may include safety and security realms, which is why ways to fuse safety and security mechanisms must be explored. Especially the convergence of the world of information and the physical world (embedded devices, cyberphysical systems) renders it necessary to invest in R&D focusing on security and safety at once. 6. Legacy: The Complexity of Evolved Software Ecosystems Dealing with the legacy requires one to integrate security into systems retroactively. This may be done pragmatically via isolating untrusted building blocks; encapsulating untrusted building blocks by building virtual software cages; or building security into legacy systems ex-post. All these measures presuppose the development of easy-to-manage techniques and tools. Quite in general, there is a need for tools and procedures to analyze security and safety in very large and complex systems; for scalable techniques and tools that allow complex systems to be broken down and analyzed in aggregates; for risk assessment techniques that go from the top all the way down; and for techniques to identify at-risk components stochastically. To avoid legacy in the future, however, there is a need to build security into systems proactively. Therefore, smart documentation techniques for expertise and knowledge capture as well as for preserving assumptions and design decisions are required, just as the development of novel methodologies that account for SD s»evolutionary«6

9 character are necessary. While educational institutions are called upon to prepare developers for being confronted with loads of legacy, industry is well advised to harmonize in-house code production to keep code comprehensible and establish long-term perspectives on the systems they produce. This may be achieved by optimizing software architecture and by introducing product line engineering. In turn, the SD trends lead to six challenges for IT security pertaining to different aspects of SD: Education: The flexibility of current SD calls for raising individual developers expertise Processes: Ways must be found to render security processes systematic and scalable also in large, distributed, and unstable social networks Methodologies: The flexibility coming with the spread of agile values must be reconciled with building continuity into SD Techniques: The increase in networking distributed components brings up the need to encapsulate untrusted components and develop intrinsically secure building blocks Metrics: There is a dire need to find better ways to measure the security of components, systems, and processes Tools: To assist developers in integrating security in SD processes, tools must be equipped with automated secure engineering features 7

10 1. Introduction In recent years, software development (SD) and IT security as well have undergone massive transformations. As regards the former, the perceived need for more flexible approaches to software development culminated in the 2001»Agile Manifesto«1 indicating a turning away from more linear, sequential methodologies as represented by the waterfall model. What is more, working environments (outsourcing, freelancing etc.) were rendered flexible in general, which certainly did affect the world of SD too. On the technical level, new sorts of products and services appeared, such as apps and Software-as-a-Service. Further, developers began to have more and more tools at their disposal when developing software, relying on Integrated Development Environments (IDEs) and the like. As far as IT security is concerned, there was a steady rise in news stories reporting on security breaches. Especially in 2013, the public realization of US secret service National Security Agency (NSA) activities enjoyed considerable press coverage. Events even drove the former German Minister of the Interior Hans-Peter Friedrich to strive to enact an IT security law. 2 From a more general point of view, as the internet was somewhat expanded to a network, more and more things started to rely increasingly on the internet, including systems of the physical world (cyber-physical systems) that had previously run more or less isolated, as well as the workings of everyday life. As a result, while critical infrastructures have become integrated into digital networks, the latter have become critical infrastructures in their own right. These rather general remarks may suffice to justify the intuition that (somewhat interrelated) major transformations in the realm of software development and in that of IT security have taken place in the last 10 to 15 years; moreover, there is no reason to believe that the dynamic of change in both these areas is going to come to a halt in the near future. We take this intuition as an opportunity to act empirically and pose the questions of what exactly the crucial transformations were that happened in the last decade or so in SD; which ones are to be expected in the near future; and how those transformations are likely to affect IT security politik/deutschland/koalitionsverhandlungen-friedrich-willit-sicherheitsgesetz-durchsetzen/ html Thus, the aim of this report is to indicate trends in software development that are currently emerging and their implications for IT security. Having said this, it is, of course, beyond all doubt that nobody is able to look into the future. However, it is still possible to elaborate possible future developments, the chains of cause and effect associated with them, and the related options for action (Steinmüller/Schulz-Montag 2004: 63). As regards the accurateness and exactness of trend analyses, sociological technology studies distinguish between visions and scenarios: while the former»are vague in their specifications of the technical features and the forms of use of the envisioned technology«(schulz-schaeffer 2012: 2,3), scenarios work by indicating rather concrete chains of cause and effect (Steinmüller/Schulz-Montag 2004: 63). In the study presented here, our aim is to provide a catalogue of the developments from the recent past or currently underway, respectively. Therefore, our approach comes closest to what is usually called an»explorative scenario«(ibid.). 8

11 We aim to achieve this by systematically absorbing the expertise of key figures in industry, academia and regulating agencies so as to generate an empirically funded picture of the trends underway (i.e. according to this expertise and at times to the additional material considered in the analysis). To do so, we harnessed qualitative sociological research methods. Exploring trends presupposes applying a method that exhibits a certain measure of openness. Furthermore, in our study we are interested in several influential factors, such as the social organization of SD, the technologies (e.g. tools) being used as well as the technology (i.e. the software) to be developed and so on. In this sense, our study is located at the intersection of sociological technology studies and organization studies. While it is quite usual in technology studies to focus on experts, in organization studies the method of the qualitative interview occupies a leading position (Kühl/Strodtholz/Taffertshoffer 2009: 19). For this reason we applied the method of the qualitative expert interview when conducting our study. In this context, experts are to be understood as decision-makers within some institutional setting; they are responsible for designing, implementing, and controlling organization-related interventions and solutions, and they have unrestricted access to sensitive information as regards organizational structures and decisions (Liebold/Trinczek 2009: 34). In the context of SD/IT security, different types of experts are to be considered: Professionals responsible for industrial software development, such as developers, team leaders, project managers, executives, consultants etc. Professionals responsible for IT security in industrial software development, such as chief security officers, chief information officers etc. Researchers at universities and semi-public research institutes concerned with either software engineering or IT security, or both (secure software engineering). Experts located in the institutional infrastructure that provides the framework of academic and industrial software development/it security endeavors, such as delegates, regulators, public authorities representatives, or auditors and evaluators operating product certification. These experts are expected to pick up information regarding current and future developments in the area of software development/it security: due to their position they can be considered as possessing an»empirical radar«that gathers information related to relevant trends in everyday practice. Hence, in-depth expert interviews with influential actors, i.e. with experts from all areas listed above formed the core of our analysis. In the next section we will describe the research procedure before presenting the results in section 3 and 4. Finally, in section 5, we will map research challenges resulting from the trends identified. 9

12 2. Research Procedure We did not limit ourselves to conducting expert interviews. Instead, we followed a threefold research strategy: First, we systematically collected internal expertise by conducting several brainstorming sessions with scholars at EC SPRIDE and the Technical University Darmstadt. Second, from the internal expertise collected, we developed a questionnaire designed to guide»quick and dirty«interviews with developers conducted at the CeBit fair These interviews served two purposes: a.) validating the assumptions put forward by our internal experts; and b.) broadening the spectrum of issues raised by addressing not only academic experts but also practitioners»in the wild.«this allowed for developing a very robust questionnaire, which we relied upon when taking the main step of our investigation: Third, we conducted 21 in-depth expert interviews with 23 key figures (two»double interviews«) in industry, academia, and institutional settings. Given the background assumptions we derived from the gathering of internal expertise, we developed an interview guideline including 14 questions 3. This guideline concerned the following areas: 3 This is the maximum number of questions that we posed; however, as not all questions were applicable to all interviewees professional areas, the number varied between 13 and 14 questions. Moreover, as is common in semi-structured expert interviews, if in the course of the conversation further questions arose, still more questions were formulated ad hoc by the interviewer. 1. An entirely open question concerning the major transformations in software development in the last 10 to 15 years and transformations to be expected in the near future 2. Questions concerning making employer-employee relationships flexible and the potential implications for IT security 3. Questions concerning the geographical distribution of collaborating developers and firms 4. Questions concerning development methodologies (assessment, pros and cons, whys and wherefores, future evolution etc.) 5. Questions concerning the relation between software type (application type, legacy etc.) and development methodology 6. Questions concerning the relevance of and awareness for IT security 7. Questions concerning the role of tools and technologies in software development 8. An entirely open question asking the interviewee to identify relevant themes insofar as they were not addressed in the interview In posing questions concerning these areas, we did not mean to impose our worldview on interviewees. In fact, one of the unique strengths of qualitative research is that it leaves plenty of room for study participants to differentiate, challenge or refute the assumptions the interviewer may hold and to feed information into the interview in a way that was not anticipated by the interviewer. We argue that this is precisely what renders expert interviews an appropriate method for conducting trend analyses; for as experts are expected to be the first to catch sight of indications for current and future developments, it is not possible for the non-expert interviewer to anticipate their expertise. 10

13 So whom did we interview? The following gives an overview over our interviewees professional areas: Software developers, team leaders, project managers: 5 Interviewees affiliation types: one global player in business software, one global player in consumer and industrial electronics, one worldwide operating bank, one major insurance company, one publicly-funded European high-tech institution. Security products & consultancy: 4 Interviewees affiliation types: three middle-sized and one large security software and consultancy firm. IT security experts in industrial software development: 5 Interviewees affiliation types: three global players in business software, one global player in consumer and industrial electronics, one global player in telecommunications. Researchers at Universities and semi-public research institutes: 4 Two researchers located in Germany, one in the EU, one in the US. Experts located in the institutional framework: 5 Interviewees affiliation types: two delegates, one auditor, one public authorities representative, one regulator. Generally speaking, most of the respondents were based in Germany. Many of them have work experience abroad (especially in the US), and two of the Germany-based interviewees have a US and a UK background, respectively. Two further interviewees were US citizens living in the US. After conducting the interviews, we went on to categorize the answers. While doing so, we did not make use of a pre-defined category scheme. Instead, we developed categories from the interviews themselves so as to really be able to systematically grasp and group the interviewees themes. In the remainder of the paper, we will present the major trends to be identified from our interviewees statements. 11

14 3. Results I.: The Current Software/ IT Security World According to Experts When analyzing the interviews, we identified a range of major themes addressed by our study participants. Having categorized those themes, we clustered the statements into six major trends. These trends concern the social and technical organization and accomplishment of software development as well as the IT security implications this brings about. Before providing an analysis of the trends, we will shortly summarize our experts statements on the general character of current and future software systems, and on the current IT security situation as well. By doing so, we intend to give the reader an idea of the software/it security world our interviewees referred to Software Characteristics 4 Please note that we only include topics that were mentioned by at least three study participants. Three actors, according to sociological definition, is the minimum number of what can be called a»group.«in this sense, we only present topics here that were identified by a group of people. 5 When analyzing the interviews, each of the 23 experts received a randomly assigned number between 1 and 23. We will thus indicate to whom a particular consideration refers by stating»e«for»expert«and the respective random number in squared brackets. The account we will provide in this section is largely the result of analyzing the answers to the first, entirely open question we posed in the interview:»from your perspective, what are the major transformations that have taken place in the realm of software development in the last years?«this is, of course, a very broad question that may refer to both the process and the product of software development. The purpose of posing it was to prompt interviewees to indulge in brainstorming (concerning recent and future trends in software development) without any specific prior priming (except for the general introductory briefing of study participants, that is). At this point, we are only interested in those answers that refer to the character of current and future software systems (i.e. software development s products). We clustered these answers into seven categories (in parentheses we indicate the number of participants who mentioned the topic) 4 : a) Cloud Computing & SaaS: Browser-Supported Access via Midget Terminals (15) By»Cloud Computing«experts [E1, E2, E4, E5, E7, E8, E9, E10, E12, E13, E14, E16, E19, E21, E22, E23] 5 referred to a range of things, such as companies outsourcing storage to external services or individual end users making use of software that does not run on their device locally. Accordingly, the common denominator of all those who, one way or another, addressed Cloud Computing is the increase in using software systems that do not run on the user s (be it a professional organization or an individual) own hardware (be it servers, desktop PCs or mobile devices) but are external to the entity that is using its device. Experts highlighted that the role of hardware will be ever more reduced to possibly small-sized terminals allowing access to external infrastructures featuring computing capacity and software via browser technology. Some interviewees stressed that, in a sense, Cloud Computing marks the return to huge systems, such as those that were ran in the pre-90ies on mainframes. The turning away from these systems that occurred by introducing PCs in the 1990ies is somewhat reverted; the current return to huge systems features a novelty insofar as Cloud Computing infrastructure nowadays comes in a networked fashion. 12

15 b) Distributed Systems and Intensified Networking (11) Another key theme experts [E1, E2, E4, E5, E6, E10, E12, E17, E19, E20, E21, E22] brought up was the distribution and networking of systems. Furthermore, interviewees believed that there would still be more cross-domain networking, for they assumed that in the future virtually everything will be equipped with sensor technology and embedded software, including the ever more physical systems and critical infrastructures. Ubiquitous computing, ambient intelligence, smart environments, and the Internet of Things can be considered catchwords pointing to different aspects of intensified networking, and our respondents left no doubt that this has wide-ranging implications for software systems hitherto deemed to run in isolation. Finally, experts expected an increase in distributed systems, i.e. in distributed software as well as distributed architectures, functionality and services, as exemplified by Service Oriented Architectures (SOA). c) Legacy: The Complexity of Evolved Software Ecosystems (10) The third theme to be accounted for is the historically evolved complexity of the software ecosystem [E4, E6, E8, E11, E12, E13, E16, E19, E20, E23]. Some of the systems composing the latter possess considerable histories with countless developers having contributed to their actual form. While legacy problems coming with complexity and a rather long lifespan are well-known, a nice way to express this was provided by one of our experts, who characterized software systems as»emergent systems«in order to highlight their constant changeability. In this respect, many respondents also identified an acceleration in the change and danger of unmanageability. d) Mobility & Apps (7) According to our respondents [E1, E2, E4, E13, E15, E21, E22, E23], a trend that has already been underway for a while, and, moreover, most probably is going to persist, is the further intensification of mobility. Most of the experts agree that apps and rather small special purpose software predominantly in use on smart phones and tablets will further propagate; so will the use of mobile devices. In this respect, one of our interviewees identified a trend towards blurring the boundary between the internal and external use of mobile devices: such devices will increasingly be used in both ways. That is to say that devices will become mobile in general. e) Compositional Software Systems and Modularization (6) A feature gaining ever more foothold in the future according to our respondents [E3, E5, E7, E9, E11, E18] is the one of compositionality. Increasingly, software will be made up of more 13

16 or less standardized modules or components that will be pieced together, thus building a particular system for the purpose of a particular use case. Many respondents pointed to the automotive industry as providing the blueprint for this kind of breaking up a product into standardized components so as to knit standard elements together afterwards. Compositional systems will be produced not only by software vendors, but software code is and will also be distributed widely via the internet and be integrated into software products, thus being reused. f) Domain Convergence (5) An outcome that to a certain degree also, but not exclusively, follows from intensified networking is domain convergence [E4, E6, E10, E17, E19]. For example, cars may be equipped with Advanced Driver Assistance Systems (ADAS) one may connect with a smart phone in order to make use of online maps. In such a case, web-based information processing and safety relevant systems, such as the car s sensor based embedded systems, affect each other. Moreover, the car may be connected to some backbone business IT that sends information used to improve the car s performance. Whereas there are profound implications for security/safety, domain convergence will also go along with hardware convergence, as it is ever more difficult to distinguish hardware devices: laptops, phones and tablets will hardly be specifiable, and hybrid technologies, such as»phablets«(a combination of smart phone and tablet), will emerge. 6 g) High Availability (4) The last characteristic we will account for here is the high availability of software systems. This characteristic is, of course, predominantly relevant as it regards systems that are accessed via the internet or otherwise and provide a specific service to the user. A case in point exemplifying the relevance of high availability may be search engines: using search engines as a service is something that is taken for granted in everyday life. The systems are more or less accessible any time, and they have to be in order to be perceived as obvious, everyday life infrastructure. This is, of course, crucial. The more they are perceived in this way, the more users these respective services attract which is in turn highly relevant, as the companies providing search engines usually rely heavily on targeted ads. Thus, according to our experts, these are the seven main characteristics of current and future software systems. We will take up some of these characteristics explicitly again when dealing with our major trends in software development below; others will be treated implicitly in the analysis. Before indulging in the latter task, however, we will first provide a scenario of the general current IT security situation as portrayed by our study participants. 6 See Newman (2013) General IT Security Situation 14

17 As regards the general IT security situation, we mainly summarize the experts statements that referred either to the current situation (e.g. attack scenarios) or to the relevance of and awareness for IT security in the past, present and near future. Whereas we did include one explicit question concerning the relevance of security for different stakeholders in the SD process 7, relevance and awareness were also addressed repeatedly in the interviews by the experts themselves. As our coding and category scheme was developed from the empirical material itself, we clustered such statements into two categories, the content of which we will present here IT Security So Far: A 2nd Order Problem According to our experts, security is by and large still treated as a 2nd order problem [E3, E7, E10, E11, E12, E15, E17, E18, E20, E22, E23]: Customers: According to our interviewees experience, customers do not care too much about security [E1, E2, E3, E7, E10, E11, E15, E18, E23]. There are several reasons for this: first, customers and consumers oftentimes lack a proper understanding of security issues: they tend to simply take security for granted when purchasing software products or services without being able to specify their security requirements and without being willing to pay a premium [E10, E15]. While security awareness among customers is apparently highly domain specific [E16, E21], generally speaking, there is not (yet) sufficient demand in order to make security a competitive advantage [E21], for many customers still focus rather on functionality and positive use value of a given software, instead of risk [E1, E2, E10, E16]. Firms: Hence, as taking care of security is expensive without visibly or directly paying off, many firms treat the matter likewise as a 2nd order problem: the functionality-security tradeoff more often than not is lost by security [E1, E2, E6, E12] unless security breaches are made public [E12, E20]. At this point, it becomes obvious that the industry necessarily has an interest in increasing awareness, for if customers are not aware, they are only little willing to pay for security. However, if breaches occur, producers (not customers) will be held responsible (not necessarily in legal, but surely in public attention terms). In this sense, it is the producers who carry the risk of suffering from reputational damage. In contrast, if customers are security aware and willing to pay, producers acquire the resources to integrate security in an economically reasonable way, thus decreasing the risk regarding reputation. Developers: While firms necessarily have a»natural«interest in producing secure products, developers themselves, according to our experts, tend to ignore security if they are not made aware by management [E3, E11, E22]. Some respondents saw one of the reasons for the alleged lack of developers awareness in a psychological problem: taking care of security in 7»I would like to ask specifically for the role IT security plays in the development process. What do you think is the role of IT security for clients of software developers and for software developers themselves?«15

18 SD for developers amounts to taking a destructive stance when actually being in a productive mood it requires one to think about the system s deconstruction (or destruction) while still constructing it [E6, E10]. The Security-Innovation-Dilemma: The problem here is that innovations in software oftentimes are produced without the developers having a precise usage context in mind. Systems are created and usage context is only established»in the wild«once the system is running (e.g. Facebook was introduced as a college networking platform before gradually evolving into the most successful online social network worldwide). Therefore, it is still harder to anticipate threat models and attack scenarios correctly. If firms do have a strong focus on security at the outset, they may develop secure applications however, at the cost of quickly rolling out innovations [E12]. Thus, while awareness for security is a pre-condition for developing secure software [E1, E2, E6, E10, E15, E19], stakeholders attitudes, nevertheless, tend to be characterized by a»security paradox«8 : customers, producers and the general public may give security rhetorically greater relevance than when compared to their actual practices [E23] IT Security From Now On: Increased Relevance and Awareness However, according to our experts, as there are novel types of technologies as well as novel types of actors and adversaries involved, the IT security situation has been profoundly transformed in the last 10 to 15 years; also, there are increasing stakes. Consequently, more than half of the experts interviewed (12) agree that the relevance of and awareness for IT security has been heightened (albeit emanating from a rather low general awareness level, see above); and they expect security to continue to gain relevance in the future. As reasons for the increase in relevance in the future they indicate a range of things: 8 The term»security paradox«is borrowed from S.B. Barnes (2006) who coined the term»privacy paradox«when doing ITrelated privacy research.»privacy paradox«describes the discrepancy between the relevance users ascribe to privacy when being asked about it and their actual privacy practices. Embedding Software into All Kinds of Things: The first reason is to be found in the networking of everything, including critical infrastructures and the physical world, with security and safety issues possibly converging [E1, E2, E4, E6, E12, E14, E15, E18, E19, E22]. With awareness in critical (say, financial or safety-related) areas traditionally being high [E7, E13, E19, E20], we may infer that as the whole world moves on into the digital realm, awareness increases in general. Participants expressed their belief that this might be considered as some kind of»natural«process towards more security/safety (similar to introducing seatbelts in car manufacture [E14]). New Types of Actors/Adversaries: There are new types of actors involved, such as large scale organizations that dispose of massive resources (organized crime; states involved in industrial espionage, cyberwar, terrorism or counter-terrorism) [E9, E14, E21, E22]. As 16

19 observable in 2013, when US secret service NSA s far-reaching activities became public, these novel types of actors are able to pose Advanced Persistent Threats (APIs), i.e. to orchestrate long-lasting attacks that are meticulously planned and hardly detectable by the target with virtuosity. While our study was carried out before the NSA scandal was covered by the mass media, some participants indicated that awareness had already at that time, i.e.»pre-nsa«, reached the executive management level [E3, E16, E22]. The Increasing Complexity of Software: The more complex the systems, the more difficult (or even impossible) it is to integrate security retroactively; in this sense, the increasing complexity of software systems heightens the relevance of engineering security into the systems right from the beginning [E4]. The Increase in Integrating Externally Produced Software Components: As supply chains in software development become more complex, there are more and more open source or outsourced components that software producers integrate. This makes security more relevant [E18]. As security gains relevance, awareness also increases. Study participants mentioned two further reasons for such an increase: More Attacks and Security Breaches That Gain the Attention of the Mass Media [E1, E2, E3, E6, E14, E18, E22]: From the explanations above, it follows that such breaches concern state-run as well as criminal activities. Nowadays Literally Everybody Faces Security Issues in His or Her Everyday Private Life [E19]: For example, when browsing the web, people are made aware of the need to install firewalls, be careful with data in online social networks, take data protection measures, etc. The bottom line of the experts statements regarding the general IT security situation is that relevance and awareness have increased in the last 10 to 15 years, albeit emanating from a rather low level. While experts expect IT security to be of continuing or even increasing relevance in the future, whether awareness is going to keep pace, not only informing practitioners (customers, firms, developers) ideas but also their practices remains an open question. This is the background situation against which we will next present trends in software development and their implications for IT security. 17

20 4. Results II.: Trends in Software Development & IT Security Implications As we stated above, the experts participating in our study raised a manifold of issues. We coded the statements and sorted them by building 14 categories, with one category being sub-divided into two sub-categories. From the categories we further condensed the material by building six clusters identified as the main trends in software development. These trends concern the following phenomena: 1. SD s Working Environment: Dynamic, Flexible, Distributed 2. Agile Software Development 3. Code Generation and Assembly of (Prefabricated) Code 4. Compositional Systems and Modularization 5. Distributed Systems and Intensified (Cross Domain) Networking 6. Legacy: The Complexity of Evolved Software Ecosystems In what follows, we will treat these trends successively. For each trend, we will first flesh out the aspects our experts accounted for as well as the implications these trends may have for IT security. We will conclude each section by providing a lessons-to-be-learned sub-chapter summarizing what follows from the insights in terms of IT security SD s Working Environment: Dynamic, Flexible, Distributed As regards the SD working environment, experts pointed out three general trends: acceleration; rendering organizational structures flexible; and distribution of production sites Acceleration of SD Processes One section of the interviews directed the interviewees attention to the general SD working environment. In this respect, 11 out of 23 respondents identified an extreme acceleration of SD processes as having begun to characterize SD in the last 10 to 15 years. Business pressure is significant [E5, E11, E20, E22], customers expect to be integrated into the development process and new features to be rolled out quickly [E8, E13]. Furthermore, with Cloud Computing, players without massive computing capacity may become competitors [E3, E13, E23]. As a result, there could be less time to focus on requirements gathering and design; developers begin to code early on in the development process [E5, E13], and development cycles get extremely short [E6, E15, E20, E21, E23]. To illustrate this point, we may refer to one of our expert s statement holding that in an app environment, idea to market phases may last one week or less [E23]. Also, enterprises must realize their ideas very quickly: as today the flow of information in general is hardly controllable anymore (due to online social networks etc.), business secrets are not able to be kept for a long time. Thus, companies have to deliver 18

Banking Application Modernization and Portfolio Management Key Challenges and Success Factors As part of their long-term strategic plans, banks are seeking to capitalize on their legacy applications. Acquired

SEVEN REASONS TO CONSIDER ERP IN THE CLOUD SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND CONTENTS INTRODUCTION 3 TRY BEFORE YOU BUY 4 TAKE ADVANTAGE OF THE MOST ADVANCED TECHNOLOGY 6 GENERATE MEASURABLE

IMPROVE YOUR ODDS OF FINDING THE RIGHT OUTSOURCING PARTNER Improve Your Odds of Finding the Right Outsourcing Partner Abstract Customer contact outsourcing can be a complex and challenging task. Are you

Excerpt from The Architect s Handbook of Professional Practice, 13th edition, 2000 Facility Management Robin Ellerthorpe, FAIA As more clients recognize the benefits of integrating facility planning with

Native, Hybrid or Mobile Web Application Development Learn more about the three approaches to mobile application development and the pros and cons of each method. White Paper Develop a Mobile Application

EUROTECH UNIVERSITIES ALLIANCE CONTRIBUTION TO THE PUBLIC CONSULTATION SCIENCE 2.0-SCIENCE IN TRANSITION A: INTRODUCTION TO THE ALLIANCE S CONTRIBUTION The EuroTech Universities Alliance is a strategic

A New Day for Life and Annuities Solutions Achieving the SOA Vision Featuring as an example: FAST 8x and FAST Insurance Components An Authors: Deb Smallwood, Founder Mary Ann Garwood, Partner Published

Appendix B Data Quality Dimensions Purpose Dimensions of data quality are fundamental to understanding how to improve data. This appendix summarizes, in chronological order of publication, three foundational

MODERNIZING IT PLATFORMS SUCCESSFULLY HOW PLATFORM RENEWAL PROJECTS CREATE VALUE INTRODUCTION The machinery and plant engineering industry is under pressure to transform. Globalization, new competitors,

Industrial Manufacturing 7 things to ask when upgrading your ERP solution The capabilities gap between older versions of ERP designs and current designs can create a problem that many organizations are

The Software-defined Data Center in the Enterprise A Cloud Report by Ben Kepes This report underwitten by: NIMBOXX The Software-defined Data Center in the Enterprise 02/12/2015 Table of Contents 1. Executive

Bring Your Own Device (BYOD) has been a fact of life since the first mobile phones came to market, but now that personal devices have the compute power of a laptop, there are challenges and opportunities

IT Best Practices Series Cloud Computing Safe Harbor or Wild West? With IT expenditures coming under increasing scrutiny, the cloud is being sold as an oasis of practical solutions. It s true that many

B3System S.A. is a leading provider of IT system and service management solutions ensuring optimized IT infrastructure performance, availability and security within businesses. The company has been operating

Assumption Busters Workshop - Cloud Computing Background: In 2011, the U.S. Federal Cyber Research Community conducted a series of four workshops designed to examine key assumptions that underlie current

White Paper Future Cloud Services: Ricoh s Perspective Under current unstable business conditions, where to provide management resources is important to a company s future. In such an environment, cloud

Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

A Guide to Carrying Out a SWOT Analysis Introduction Resource 1.4 A SWOT (strengths, weaknesses, opportunities and threats) analysis is often done as part of the process of developing a business plan or

SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.

Planning a Move to the Cloud Tips, Tricks and Pitfalls Through this year-long series of whitepapers and webinars, independent analyst Ben Kepes will be building a Cloud Computing curriculum designed for

efolder White Paper: How to Choose the Best Cloud Backup Service for Google Apps January 2015 Introduction This paper is a resource for IT-responsible professionals working in corporations that use Google

How to Choose the Best Cloud Backup Service for Salesforce Introduction This paper is a resource for IT-responsible professionals working in corporations that use Salesforce. Over the past several years,

Root Cause Analysis Concepts and Best Practices for IT Problem Managers By Mark Hall, Apollo RCA Instructor & Investigator A version of this article was featured in the April 2010 issue of Industrial Engineer

The Massachusetts Open Cloud (MOC) October 11, 2012 Abstract The Massachusetts open cloud is a new non-profit open public cloud that will be hosted (primarily) at the MGHPCC data center. Its mission is

efolder White Paper: How to Choose the Best Cloud Backup Service February 2015 Introduction This paper is a resource for IT professionals working in corporations that use a number of cloud services, including

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director

Infopreneurship Journal (IJ) Available online at www.infopreneurship.net Infopreneurship Journal (IJ), 2013, Vol.1, No.1 Cloud Computing and Risk: A look at the EU and the application of the Data Protection

Aims of the lecture: 1. Introduce the issue of a systems requirements. 2. Discuss problems in establishing requirements of a system. 3. Consider some practical methods of doing this. 4. Relate the material

SEPTEMBER 2013 By: David Krebs Vice President THE FOLLOWING IS AN EXECUTIVE ON: HTML5 Enterprise Mobility: Strategy, Challenges and Solutions Exclusive License to Distribute: VERIVO 1 Executive Summary

Understanding the impact of the connected revolution Vodafone Power to you 02 Introduction With competitive pressures intensifying and the pace of innovation accelerating, recognising key trends, understanding

The Future-ready Enterprise Simplicity, flexibility, and the art of delivering business outcomes. Every day business leaders make decisions designed to move their companies toward specific outcomes. Whether

Boards and CEOs preparing for growth Almost half of the CEOs in Denmark s largest corporations consider the financial crisis to be over and expect positive growth in the near future. This calls for preparation

B.Com(Computers) II Year RELATIONAL DATABASE MANAGEMENT SYSTEM Unit- I 1 1. What is Data? A. Data is a collection of raw information. 2. What is Information? A. Information is a collection of processed

Chapter 1 Cloud Computing Defined In This Chapter Examining the reasons for cloud Understanding cloud types Defining the elements of cloud computing Comparing private and public clouds In a dynamic economic

Chapter 5 Supply chain management in the ERP industry 5.1 Introduction Supply chain management is a management philosophy that takes a systems approach to viewing the supply chain as a single entity (Mentzer

pm4dev, 2007 management for development series Introduction to Project Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS A methodology to manage